Keyword: andromeda
82 Total Search   |   Showing Results : 1 - 20
   Next  
This malware family refers to variants consisting of backdoors that are tied to the ANDROMEDA botnet. The botnet was first spotted in late 2011. It is a modular bot, the functions can be easily
This malware family refers to variants consisting of backdoors that are tied to the ANDROMEDA botnet. The botnet was first spotted in late 2011. It is a modular bot, the functions can be easily
detection: ANDROMEDA If your Trend Micro product detects malicious network packets, your system may have malware that sends the network packets. Scan your system with your Trend Micro product to locate the
This Trojan arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It creates folders where it drops its files. It attempts
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. Arrival Details This spyware arrives on a system as a
This spyware arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It deletes the initially executed copy of itself.
and Settings\All Users\Temp\{8 random characters}.com It adds the following mutexes to ensure that only one of its copies runs at any one time: andromeda It stays resident in memory by creating the
This worm arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. It drops an AUTORUN.INF file to automatically execute the
This Backdoor arrives as an attachment to email messages mass-mailed by other malware/grayware or malicious users. It arrives on a system as a file dropped by other malware or as a file downloaded
This Worm arrives via removable drives. It arrives on a system as a file dropped by other malware or as a file downloaded unknowingly by users when visiting malicious sites. However, as of this
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It modifies the Internet Explorer Zone Settings. It deletes itself after execution.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It modifies the Internet Explorer Zone Settings. It deletes itself after execution.
This backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It does not have any propagation routine. It executes commands from a remote malicious
This Backdoor arrives as an attachment to email messages spammed by other malware/grayware or malicious users. It modifies the Internet Explorer Zone Settings. It deletes itself after execution.
This malware is the filelessly-installed backdoor malware discovered on early August 2017. Users whose systems are affected by this particular malware may find the security of their systems
Description Name: ANDROMEDA - HTTP (Request) - Variant 2 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some...
Description Name: ANDROMEDA - HTTP (Request) - Variant 5 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some...
Description Name: ANDROMEDA - HTTP (Request) - Variant 7 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as N/A. This also indicates a malware infection. Below are some indicators of an infected hos...
Description Name: ANDROMEDA - HTTP (Request) - Variant 8 . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some...
Description Name: ANDROMEDA - HTTP (Request) . This is Trend Micro detection for packets passing through HTTP network protocols that can be used as Command and Control Communication. This also indicates a malware infection. Below are some indicators ...